Docs / Security Controls
Control map
This map ties each security claim to a specific control, decision flow, and evidence output.
How to use
1. Review control
Understand the control definition.
2. Verify implementation
Confirm evidence output exists.
3. Export proof
Generate evidence for auditors.
4. Monitor drift
Track changes to control posture.
Execution controls
Identity + access
Audit + evidence
Key API endpoints
GET /compliance/controls — control map snapshotEvidence outputs
Control map export
Evidence mapping